CVE-2022-22514

7.1 HIGH

📋 TL;DR

CVE-2022-22514 is a memory corruption vulnerability in CODESYS Control runtime systems that allows authenticated remote attackers to cause denial of service through system crashes. Attackers can dereference pointers in requests leading to invalid memory access, but cannot read memory contents or control written values. This affects industrial control systems using vulnerable CODESYS software.

💻 Affected Systems

Products:
  • CODESYS Control runtime systems
Versions: All versions prior to V3.5.18.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects CODESYS Control runtime systems with CmpTraceMgr component enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash leading to denial of service in industrial control environments, potentially disrupting critical operations.

🟠

Likely Case

Service disruption through application crashes requiring manual restart of affected CODESYS runtime systems.

🟢

If Mitigated

Minimal impact with proper network segmentation and authentication controls limiting attack surface.

🌐 Internet-Facing: MEDIUM - Requires authentication but internet-exposed systems could be targeted for DoS attacks.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials could disrupt industrial operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and specific knowledge of the system. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.5.18.0 and later

Vendor Advisory: https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17093&token=15cd8424832ea10dcd4873a409a09a539ee381ca&download=

Restart Required: Yes

Instructions:

1. Download CODESYS Control V3.5.18.0 or later from CODESYS customer portal. 2. Backup current configuration. 3. Install update following vendor instructions. 4. Restart affected systems.

🔧 Temporary Workarounds

Disable CmpTraceMgr component

all

Remove or disable the vulnerable CmpTraceMgr component if not required for operations.

Refer to CODESYS documentation for component management commands

Network segmentation

all

Restrict network access to CODESYS systems to only trusted sources.

firewall rules to limit access to CODESYS ports (typically 1217, 1740-1750)

🧯 If You Can't Patch

  • Implement strict authentication controls and limit user access to minimum required privileges
  • Monitor systems for crash events and implement redundancy for critical operations

🔍 How to Verify

Check if Vulnerable:

Check CODESYS Control version via CODESYS IDE or system information tools. Versions below V3.5.18.0 are vulnerable.

Check Version:

Check via CODESYS IDE: Project → Device → Device Information or system-specific version commands

Verify Fix Applied:

Verify installed version is V3.5.18.0 or later using CODESYS version check commands or IDE.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected application crashes
  • Memory access violation errors in system logs
  • CmpTraceMgr component failures

Network Indicators:

  • Unusual authentication attempts to CODESYS services
  • Traffic patterns indicating DoS attempts

SIEM Query:

source="codesys" AND (event_type="crash" OR error="memory" OR component="CmpTraceMgr")

🔗 References

📤 Share & Export